The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
12 Jan 2024, 20:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Opensuse opensuse Opensuse Suse linux Enterprise Suse Redhat enterprise Linux |
|
References | (SECUNIA) http://secunia.com/advisories/35416 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html - Mailing List | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/02/12/4 - Mailing List | |
References | (MISC) http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 - Product | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/02/12/7 - Mailing List | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - Mailing List | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/35685 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - Mailing List | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/02/12/2 - Mailing List | |
References | (CONFIRM) http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367 - Product | |
References | (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=250429 - Exploit, Issue Tracking | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=485211 - Issue Tracking, Patch | |
References | (SECTRACK) http://www.securitytracker.com/id?1021921 - Broken Link, Third Party Advisory, VDB Entry | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-0295.html - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/34499 - Broken Link | |
CWE | CWE-863 | |
CPE | cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.2.1.2_r1:*:*:*:*:*:*:* cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.4.2:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.2:*:*:*:*:*:*:* cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:* cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:5.1.4:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:10.3-11.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:9-11:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:* cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:* |
Information
Published : 2009-02-12 16:30
Updated : 2024-01-12 20:41
NVD link : CVE-2008-6123
Mitre link : CVE-2008-6123
JSON object : View
Products Affected
redhat
- enterprise_linux
suse
- linux_enterprise
opensuse
- opensuse
net-snmp
- net-snmp
CWE
CWE-863
Incorrect Authorization